Author's Latest Posts


Recharging The Battery


There are few technologies in today’s cutting-edge technological environment that have a difficult time finding new levels of performance. Battery technology is one of them. With the exception of a few experimental offerings, batteries and their performance metrics are relatively flat. There has been some progress, of course. But when compared to other technologies such as transistors, mem... » read more

Emerging Security Protocols


As the proliferation of mobile devices ramps up at escalating rates, securing these devices and the infrastructure they run on is becoming a top priority for both the hardware and the data that swirls within it. Traditional security platforms such as firewalls and antivirus programs are still a viable part of the security envelope, but the rapid emergence of zero-day/hour threats is somethin... » read more

How IoE Will Alter Supply Chains


Globalization is a double-edged sword. Without a doubt, it nourishes competition, offers a plethora of independent sources, and bounty of supplies from a global pool of vendors. That is the good side. The downside is that control becomes a management nightmare. Well-oiled, traditional supply chains systems will have to be redesigned to function across a variety of variables that can interrupt t... » read more

Cryptography For ULP Devices


Soon virtually everything and everyone will be connected to the IoE in one fashion or another, and much of it will be wireless. To make it all work, these wireless, and low-power devices will need a new paradigm for handling cryptography. Ultra-low power devices have an interesting, and challenging set of metrics. There are, in general, two approaches that can work, with a variety of sub-sce... » read more

Who’s Driving That Car?


In my May blog, I had written a short on the incident where supposedly, airliner's computer system had been compromised by a wayward security researcher from One World Labs. Chris Roberts was his name. Anyway, if you didn’t read about it, the long and short of it is that he hacked a simulator and not a jet. Nevertheless, the issues that raises have implications across the entire transportatio... » read more

More Than Just Plastic


The magnetic strip credit card era is coming to an end. The technology is antiquated, prone to security vulnerabilities, and has no self-destruct capability if lost or stolen. In its place are near-field technologies coupled with smart devices—think Apple Pay, Android Pay, Samsung Pay, digital wallets, MasterCard's PayPass—and now near-field communication (NFC) chips inside of cards. But... » read more

Securing IoE Gateways


When we talk about the [getkc id="260" comment="Internet of Everything"], (IoE) we have come to realize that it will really be made up of a lot of different “things. It will envelope everything from home automation to intelligent vehicles, to wearables, to industrial applications, military, infrastructure. The list is almost endless. And there is a lot of discussion about securing these “th... » read more

Big Data, Big Holes


Having the potential to collect massive amounts of data from a variety of sources is the latest tool for trend spotting, predictive modeling, and forecasting of information. Information is power and big data promises to provide substantial, significant data that can be used by all tiers of businesses in the development of any number of new industrial and commercial strategies. For retailers ... » read more

Let’s Talk Open Source


Of late I have been hearing some rumblings about open source for the IoE. The sad part is that there is still talk about anything else. Even though the IoE remains a dream to many, the shrewd marketers already are scheming on how to make their product the one that leads that pack, and many see proprietary source code as a way to differentiate themselves. I can see that in any number of appli... » read more

Mobile Security And The IoE


As we climb that mobility ladder to becoming a mostly mobile society, every rung seems to expose us to more and more layers of security failings. Six billion of the seven billion people on this planet rely on a variety of mobile devices to shop, bank, interface with social media, monitor their health, and monitor their environment. Unless you are on the inside track and know better, one would t... » read more

← Older posts Newer posts →